Abstract: With the development of wireless network, new technology, and growing needs of human being on the network services, it is essential for the network engineer that they will look forward to provide that Quality of Service (QoS) which is unbreakable, and suitable for future perspective. To provide the best QoS from any network required, the best optimized algorithm, strategies and decision parameter. The current study reviewed the best algorithm present for Wi-MAX network optimization and tries to find the parameter which is basically required to develop a wireless network which will provide QoS.
Keywords: Wi-MAX, Wireless Network, QoS, Traffic Load, power consumption

Abstract: Mostly Air jet looms are being used in the industry for production of high quality denim fabrics. Indian companies are producing denim fabric in millions of metres per annum while the export potential still remains weak. The main reasons for poor exports are quality of fabric not compatible with world class manufacturing with cost effective weaving, subjective decisions in four point fabric inspection system, urgency of delivery due to low production and retention of skilled manpower in a particular industry. Based on Market requirement only implementation and follow up of world class norms will improve the export of denim.
Keywords: looms, industry, production, fabrics, export, skilled, delivery
References:1.World Class Manufacturing by Kamalakar Mutalik (Symbiosis – 2011)2.Indian Textile Industry in 2015 – A Vision by Cygnus Business Consulting & Research, Hyderabad 3.Demand – Supply Gap in Trained Manpower by Nayan C. Parikh4.Trend Analysis of India & China’s Textiles (Federation of Indian Chambers of Commerce & Industry)5."Working Lives India: Denim king". BBC News. Retrieved 20 May 2015.6."RIL eyes Arvind Mills' manufacturing facilities". The Economic Times. 27 Oct 20077.www.raymondindia.com/grp_uco.asp8.sinhagroup.com9.http://www.made-in-china.com/cs/hot-chinaproducts/Denim_Jeans.html

Abstract: This paper presents a numeric model analysis of a large scale solar photovoltaic (PV) generations projects taking advantage of the Feed-in Tariff (FiT) policies by government. It proposed an optimal plan for low risk and high return investment of one of the most rapidly growth renewable energy technology. In order to achieved that target, several selection criteria has been described such as strategic location, long life time materials, high durability and reliability, less maintenance and affordable raw material price. The objective of this study is to propose an optimal investment plan using structured numeric model analysis based on the case study at the Kuala Lumpur International Airport (KLIA), Malaysia. The PV generation project investment achievement is measured using several parameters such as cash flow, Return of Investment (ROI), payback period, Net Present Value (NPV), Internal Rate of Return (IRR) and cost break-even analysis. Based on the analysis, it can be convinced that solar PV generation FiT project is desired to undertake where it provides good long-term investment.
Keywords: Photovoltaic (PV), Feed-in tariff (FiT), renewable energy, numeric model analysis, investment.References:1.Muneer, W. ; Bhattacharya, K. ; Canizares, C.A. ,"Large-Scale Solar PV Investment Models, Tools, and Analysis: The Ontario Case",IEEETransactions on Power Systems , Vol. 26 , Issue: 4 2011 , Pp. 2547 - 2555, 2011.
2.Radhika Perrot &AselDoranova, "The Dynamics of Renewable Energy Transforming in Developing Countries",Technological Systems of Innovation in Renewable Energy Technology of Developing Countries, Retrieved from http://www.ukerc.ac.uk /support/tiki-download_file.php?fileId=1959&display.3.M.H.Jali, H.Sarkawi, T.A.Izzuddin, M.F.Sulaima, M.N.M.Nasir,“Solar PV Project Implementation Feasibility Study based on Feed-in Tariff in Malaysia“, International Journal of Applied Engineering Research, Vol. 9 (21), pp 9629 - 9638, 2014.
4.Ir.AhmadHadriHaris, "Renewable Energy Bill and SEDA Bill", retried from http://www.mbipv.net.my/dload/presentation-RE%20Bill-16Mar2011.pdf.
5.GPEKS Clean Energy Developments and Services, "Feasibility Analysis for 520kW Solar Photovoltaic Project at Consejo Belize", Retrieved from http://solartechnologies.ru/files/520kwSolar.pdf.

10-15

5.

Authors:

Yongseok Choi, Cheol-Hoon Lee

Paper Title:

PCI Express Optical Repeater for Server I/O Expansion

Abstract: We suggested a new PCI Express Optical Repeater Device which can locate I/O Devices externally for I/O expansion, not locate all I/O Devices in Server that has limit in Volume and Power in this paper. This Device doesn't convert PCI Express signal to Optical Signal directly, but in PCI Express Switch Architecture, uses the layered architecture to make Switch's internal bus or interconnection the optical interface. Thus there is no disadvantage of wasting bandwidth. This solves signal attenuation and over-power dissipation for the sake of Optical Interface Characteristics and can meet distances requirement for Server Environment. We expect that the methods and research results in this paper can be used in Small Server which will want I/O Expansion
Keywords: PCI Express, Optical Repeater, Server, I/O, Interconnection
References:1.PCISIG, "PCI Express External Cabling Specification Revision 1.0", pp53-134, 2007
2.http://www.adnaco.com
3.Avago, "A Demonstration of PCI Express Generation 3 over a Fiber Optical Link", 2012
4.PCISIG, "PCI Express Base Specification Revision 2.1", pp43, 2009

16-19

6.

Authors:

Palak Thadeshwar, Rohan Vora, Aishwarya Ramachandran, Lakshmi Kurup

Paper Title:

Proposed Model for Sandboxing in Linux

Abstract: The proliferation and popularity of the Internet has led to average Internet users downloading various utilities and applications from the Internet very frequently. Often, these applications are downloaded from untrusted users and websites, or from unverified third parties and suppliers. Due to this, it has become very important for a casual user to differentiate between a malicious and a benign application. This has become excessively difficult because of the rise in number of malicious applications on the Internet. In computer Security, Sandboxing is a mechanism that allows unknown or untrusted code into the system, and yet does not let it damage the system. A sandbox isolates the running program from the rest of the system by imposing restrictions on network resources and file system access, and keeps the host system safe. A sandbox system heavily restricts the program from inspecting the host or reading from the input device. In this paper, we review existing tools that provide sandboxing mechanisms. We compare what features have been used by each, and highlight the advantages and disadvantages of each. In the end, we propose a system that will incorporate the best features of these tools, yet be user-friendly.
Keywords: Computer Security, Sandboxing, Seccomp-bpf, System call interposition.
References:1.Taesoo Kim and Nickolai Zeldovich. Practical and effective sandboxing for non-root users. In Proceedings of the 2013 USENIX Conference on Annual Technical Conference, USENIX ATC’13, pages 139–144, Berkeley, CA, USA, 2013. USENIX Association.
2.Graphical Security Sandbox For Linux Systems Topaktas, Cosay Gurkay (2014) Graphical Security Sandbox For Linux Systems. Masters thesis, National University of Ireland Maynooth.
3.Anurag Acharya and Mandar CoolRaje. MAPbox: Using parameterized behavior classes to confine untrusted applications. In Proceedings of the 9th Conference on USENIX Security Symposium—Volume 9, SSYM’00, Berkeley, CA, USA, 2000. USENIX Association.
4.David A. Wagner. Janus: An approach for confinement of untrusted applications. Technical report, University of California at Berkeley, Berkeley, CA, USA, 1999
5.Garfinkel, Pfaff, and Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Proceedings of Network and Distributed Systems Security Symposium, NDSS 04, San Diego, CA, 2004.
6. A Policy-driven, Host-Based Intrusion Detection System, ISOC Symposium on Network and Distributed System Security, San Diego, CA, USA, February 2002. ISOC